Research on Security Protection Technology System of Power Internet of Things
Title | Research on Security Protection Technology System of Power Internet of Things |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Gao, Peng, Yang, Ruxia, Shi, Congcong, Zhang, Xiaojian |
Conference Name | 2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC) |
Date Published | may |
Keywords | application layer cloud fog security management, application security risks, authentication, authority control, cloud computing, Computer architecture, computer network management, computer network security, data communication, data transmission protection, edge area autonomy, edge computing, fog calculation, Fog Computing, Human Behavior, Internet, Internet of Things, Metrics, Network security, Network Security Architecture, power engineering computing, power grid transmission, power grids, power Internet of Things, Power system protection, power system security, privacy protection, production links, Protocols, pubcrawl, real-time security monitoring, resilience, Resiliency, Scalability, security, security monitoring, security protection technology system, sensor security, Sensors, terminal identity authentication |
Abstract | With the rapid development of Internet of Things applications, the power Internet of Things technologies and applications covering the various production links of the power grid "transmission, transmission, transformation, distribution and use" are becoming more and more popular, and the terminal, network and application security risks brought by them are receiving more and more attention. Combined with the architecture and risk of power Internet of Things, this paper first proposes the overall security protection technology system and strategy for power Internet of Things; then analyzes terminal identity authentication and authority control, edge area autonomy and data transmission protection, and application layer cloud fog security management. And the whole process real-time security monitoring; Finally, through the analysis of security risks and protection, the technical difficulties and directions for the security protection of the Internet of Things are proposed. |
DOI | 10.1109/ITAIC.2019.8785603 |
Citation Key | gao_research_2019 |
- real-time security monitoring
- power grid transmission
- power grids
- power Internet of Things
- Power system protection
- power system security
- privacy protection
- production links
- Protocols
- pubcrawl
- power engineering computing
- resilience
- Resiliency
- Scalability
- security
- security monitoring
- security protection technology system
- sensor security
- sensors
- terminal identity authentication
- edge area autonomy
- application security risks
- authentication
- authority control
- Cloud Computing
- computer architecture
- computer network management
- computer network security
- data communication
- data transmission protection
- application layer cloud fog security management
- edge computing
- fog calculation
- Fog computing
- Human behavior
- internet
- Internet of Things
- Metrics
- network security
- Network Security Architecture